diff options
author | 宋文武 <iyzsong@member.fsf.org> | 2017-07-12 20:35:57 +0800 |
---|---|---|
committer | 宋文武 <iyzsong@member.fsf.org> | 2017-07-15 19:17:37 +0800 |
commit | 59132b800093e486e4d81aed6b837e9ac76aa86c (patch) | |
tree | c8fb4d99d7a1ba7934a41974fa2b36dc5f6bd47e /gnu/packages/qemu.scm | |
parent | 8d858010b373485dcd999c30ec58bede53bd7ecd (diff) | |
download | guix-59132b800093e486e4d81aed6b837e9ac76aa86c.tar.gz |
gnu: Rename (gnu packages qemu) to (gnu packages virtualization).
* gnu/packages/qemu.scm: Rename this ... * gnu/packages/virtualization.scm: ... to this. * gnu/local.mk (GNU_SYSTEM_MODULES), gnu/packages/bootloaders.scm, gnu/packages/debug.scm, gnu/packages/gnome.scm, gnu/system/vm.scm, gnu/tests/install.scm: Adjust accordingly.
Diffstat (limited to 'gnu/packages/qemu.scm')
-rw-r--r-- | gnu/packages/qemu.scm | 507 |
1 files changed, 0 insertions, 507 deletions
diff --git a/gnu/packages/qemu.scm b/gnu/packages/qemu.scm deleted file mode 100644 index 0bd314c660..0000000000 --- a/gnu/packages/qemu.scm +++ /dev/null @@ -1,507 +0,0 @@ -;;; GNU Guix --- Functional package management for GNU -;;; Copyright © 2013, 2014, 2015, 2016 Ludovic Courtès <ludo@gnu.org> -;;; Copyright © 2015, 2016, 2017 Mark H Weaver <mhw@netris.org> -;;; Copyright © 2016, 2017 Efraim Flashner <efraim@flashner.co.il> -;;; Copyright © 2016 Ricardo Wurmus <rekado@elephly.net> -;;; -;;; This file is part of GNU Guix. -;;; -;;; GNU Guix is free software; you can redistribute it and/or modify it -;;; under the terms of the GNU General Public License as published by -;;; the Free Software Foundation; either version 3 of the License, or (at -;;; your option) any later version. -;;; -;;; GNU Guix is distributed in the hope that it will be useful, but -;;; WITHOUT ANY WARRANTY; without even the implied warranty of -;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -;;; GNU General Public License for more details. -;;; -;;; You should have received a copy of the GNU General Public License -;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>. - -(define-module (gnu packages qemu) - #:use-module (gnu packages) - #:use-module (gnu packages admin) - #:use-module (gnu packages attr) - #:use-module (gnu packages autotools) - #:use-module (gnu packages check) - #:use-module (gnu packages compression) - #:use-module (gnu packages curl) - #:use-module (gnu packages cyrus-sasl) - #:use-module (gnu packages disk) - #:use-module (gnu packages dns) - #:use-module (gnu packages gl) - #:use-module (gnu packages glib) - #:use-module (gnu packages gnome) - #:use-module (gnu packages gtk) - #:use-module (gnu packages image) - #:use-module (gnu packages libusb) - #:use-module (gnu packages linux) - #:use-module (gnu packages ncurses) - #:use-module (gnu packages perl) - #:use-module (gnu packages pkg-config) - #:use-module (gnu packages polkit) - #:use-module (gnu packages python) - #:use-module (gnu packages sdl) - #:use-module (gnu packages spice) - #:use-module (gnu packages texinfo) - #:use-module (gnu packages tls) - #:use-module (gnu packages web) - #:use-module (gnu packages xdisorg) - #:use-module (gnu packages xml) - #:use-module (guix build-system gnu) - #:use-module (guix build-system python) - #:use-module (guix download) - #:use-module ((guix licenses) #:select (gpl2 gpl2+ lgpl2.1+)) - #:use-module (guix packages) - #:use-module (guix utils) - #:use-module (srfi srfi-1)) - -(define (qemu-patch commit file-name sha256) - "Return an origin for COMMIT." - (origin - (method url-fetch) - (uri (string-append - "http://git.qemu.org/?p=qemu.git;a=commitdiff_plain;h=" - commit)) - (sha256 sha256) - (file-name file-name))) - -(define-public qemu - (package - (name "qemu") - (version "2.9.0") - (source (origin - (method url-fetch) - (uri (string-append "http://wiki.qemu-project.org/download/qemu-" - version ".tar.xz")) - (patches (search-patches "qemu-CVE-2017-7493.patch" - "qemu-CVE-2017-8112.patch" - "qemu-CVE-2017-8309.patch" - "qemu-CVE-2017-8379.patch" - "qemu-CVE-2017-8380.patch" - "qemu-CVE-2017-9524.patch")) - (sha256 - (base32 - "08mhfs0ndbkyqgw7fjaa9vjxf4dinrly656f6hjzvmaz7hzc677h")))) - (build-system gnu-build-system) - (arguments - '(;; Running tests in parallel can occasionally lead to failures, like: - ;; boot_sector_test: assertion failed (signature == SIGNATURE): (0x00000000 == 0x0000dead) - #:parallel-tests? #f - - #:phases - (modify-phases %standard-phases - (replace 'configure - (lambda* (#:key inputs outputs (configure-flags '()) - #:allow-other-keys) - ;; The `configure' script doesn't understand some of the - ;; GNU options. Thus, add a new phase that's compatible. - (let ((out (assoc-ref outputs "out"))) - (setenv "SHELL" (which "bash")) - - ;; While we're at it, patch for tests. - (substitute* "tests/libqtest.c" - (("/bin/sh") (which "sh"))) - - ;; The binaries need to be linked against -lrt. - (setenv "LDFLAGS" "-lrt") - (zero? - (apply system* - `("./configure" - ,(string-append "--cc=" (which "gcc")) - ;; Some architectures insist on using HOST_CC - ,(string-append "--host-cc=" (which "gcc")) - "--disable-debug-info" ; save build space - "--enable-virtfs" ; just to be sure - ,(string-append "--prefix=" out) - ,@configure-flags)))))) - (add-after 'install 'install-info - (lambda* (#:key inputs outputs #:allow-other-keys) - ;; Install the Info manual, unless Texinfo is missing. - (or (not (assoc-ref inputs "texinfo")) - (let ((out (assoc-ref outputs "out"))) - (and (zero? (system* "make" "info")) - (let ((infodir (string-append out "/share/info"))) - (for-each (lambda (info) - (install-file info infodir)) - (find-files "." "\\.info")) - #t)))))) - (add-before 'check 'make-gtester-verbose - (lambda _ - ;; Make GTester verbose to facilitate investigation upon failure. - (setenv "V" "1") #t)) - (add-before 'check 'disable-test-qga - (lambda _ - (substitute* "tests/Makefile.include" - ;; Comment out the test-qga test, which needs /sys and - ;; fails within the build environment. - (("check-unit-.* tests/test-qga" all) - (string-append "# " all))) - #t))))) - (inputs ; TODO: Add optional inputs. - `(("alsa-lib" ,alsa-lib) - ("attr" ,attr) - ("glib" ,glib) - ;; ("libaio" ,libaio) - ("libattr" ,attr) - ("libcap" ,libcap) ; virtfs support requires libcap & libattr - ("libjpeg" ,libjpeg-8) - ("libpng" ,libpng) - ("libusb" ,libusb) ;USB pass-through support - ("mesa" ,mesa) - ("ncurses" ,ncurses) - ;; ("pciutils" ,pciutils) - ("pixman" ,pixman) - ("sdl" ,sdl) - ("spice" ,spice) - ("util-linux" ,util-linux) - ;; ("vde2" ,vde2) - ("virglrenderer" ,virglrenderer) - ("zlib" ,zlib))) - (native-inputs `(("glib:bin" ,glib "bin") ; gtester, etc. - ("perl" ,perl) - ("pkg-config" ,pkg-config) - ("python" ,python-2) ; incompatible with Python 3 according to error message - ("texinfo" ,texinfo))) - (home-page "http://www.qemu-project.org") - (synopsis "Machine emulator and virtualizer") - (description - "QEMU is a generic machine emulator and virtualizer. - -When used as a machine emulator, QEMU can run OSes and programs made for one -machine (e.g. an ARM board) on a different machine---e.g., your own PC. By -using dynamic translation, it achieves very good performance. - -When used as a virtualizer, QEMU achieves near native performances by -executing the guest code directly on the host CPU. QEMU supports -virtualization when executing under the Xen hypervisor or using -the KVM kernel module in Linux. When using KVM, QEMU can virtualize x86, -server and embedded PowerPC, and S390 guests.") - - ;; Many files are GPLv2+, but some are GPLv2-only---e.g., `memory.c'. - (license gpl2) - - ;; Several tests fail on MIPS; see <http://hydra.gnu.org/build/117914>. - (supported-systems (delete "mips64el-linux" %supported-systems)))) - -(define-public qemu-minimal - ;; QEMU without GUI support. - (package (inherit qemu) - (name "qemu-minimal") - (synopsis "Machine emulator and virtualizer (without GUI)") - (arguments - `(#:configure-flags - ;; Restrict to the targets supported by Guix. - '("--target-list=i386-softmmu,x86_64-softmmu,mips64el-softmmu,arm-softmmu,aarch64-softmmu") - ,@(package-arguments qemu))) - - ;; Remove dependencies on optional libraries, notably GUI libraries. - (inputs (fold alist-delete (package-inputs qemu) - '("libusb" "mesa" "sdl" "spice" "virglrenderer"))))) - -(define-public libosinfo - (package - (name "libosinfo") - (version "1.0.0") - (source - (origin - (method url-fetch) - (uri (string-append "https://releases.pagure.org/libosinfo/libosinfo-" - version ".tar.gz")) - (sha256 - (base32 - "0srrs2m6irqd4f867g8ls6jp2dq3ql0l9d0fh80d55sivvn2bd7p")))) - (build-system gnu-build-system) - (arguments - `(#:configure-flags - (list (string-append "--with-usb-ids-path=" - (assoc-ref %build-inputs "usb.ids")) - (string-append "--with-pci-ids-path=" - (assoc-ref %build-inputs "pci.ids"))) - #:phases - (modify-phases %standard-phases - ;; This odd test fails for unknown reasons. - (add-after 'unpack 'disable-broken-test - (lambda _ - (substitute* "test/Makefile.in" - (("test-isodetect\\$\\(EXEEXT\\)") "")) - #t))))) - (inputs - `(("libsoup" ,libsoup) - ("libxml2" ,libxml2) - ("libxslt" ,libxslt) - ("gobject-introspection" ,gobject-introspection))) - (native-inputs - `(("check" ,check) - ("glib" ,glib "bin") ; glib-mkenums, etc. - ("gtk-doc" ,gtk-doc) - ("vala" ,vala) - ("intltool" ,intltool) - ("pkg-config" ,pkg-config) - ("pci.ids" - ,(origin - (method url-fetch) - (uri "https://github.com/pciutils/pciids/raw/ad02084f0bc143e3c15e31a6152a3dfb1d7a3156/pci.ids") - (sha256 - (base32 - "0kfhpj5rnh24hz2714qhfmxk281vwc2w50sm73ggw5d15af7zfsw")))) - ("usb.ids" - ,(origin - (method url-fetch) - (uri "http://linux-usb.cvs.sourceforge.net/viewvc/linux-usb/htdocs/usb.ids?revision=1.551") - (file-name "usb.ids") - (sha256 - (base32 - "17rg5i0wbyk289gr8v4kgvnc9q5bidz7ldcvv9x58l083wn16hq3")))))) - (home-page "https://libosinfo.org/") - (synopsis "Operating system information database") - (description "libosinfo is a GObject based library API for managing -information about operating systems, hypervisors and the (virtual) hardware -devices they can support. It includes a database containing device metadata -and provides APIs to match/identify optimal devices for deploying an operating -system on a hypervisor. Via GObject Introspection, the API is available in -all common programming languages. Vala bindings are also provided.") - ;; The library files are released under LGPLv2.1 or later; the source - ;; files in the "tools" directory are released under GPLv2+. - (license (list lgpl2.1+ gpl2+)))) - -(define-public libvirt - (package - (name "libvirt") - (version "3.5.0") - (source (origin - (method url-fetch) - (uri (string-append "http://libvirt.org/sources/libvirt-" - version ".tar.xz")) - (sha256 - (base32 - "05mm4xdw6g960rwvc9189nhxpm1vrilnmpl4h4m1lha11pivlqr9")))) - (build-system gnu-build-system) - (arguments - `(;; FAIL: virshtest - ;; FAIL: virfirewalltest - ;; FAIL: virkmodtest - ;; FAIL: virnetsockettest - ;; FAIL: networkxml2firewalltest - ;; FAIL: nwfilterebiptablestest - ;; FAIL: nwfilterxml2firewalltest - ;; Times out after PASS: virsh-vcpupin - #:tests? #f - #:configure-flags - (list "--with-polkit" - "--sysconfdir=/etc" - "--localstatedir=/var") - #:phases - (modify-phases %standard-phases - (add-after 'unpack 'fix-tests - (lambda _ - (substitute* '("tests/commandtest.c" - "gnulib/tests/test-posix_spawn1.c" - "gnulib/tests/test-posix_spawn2.c") - (("/bin/sh") (which "sh"))) - #t)) - (replace 'install - ;; Since the sysconfdir and localstatedir should be /etc and /var - ;; at runtime, we must prevent writing to them at installation - ;; time. - (lambda _ - (zero? (system* "make" "install" - "sysconfdir=/tmp/etc" - "localstatedir=/tmp/var"))))))) - (inputs - `(("libxml2" ,libxml2) - ("gnutls" ,gnutls) - ("dbus" ,dbus) - ("qemu" ,qemu) - ("polkit" ,polkit) - ("libpcap" ,libpcap) - ("libnl" ,libnl) - ("libuuid" ,util-linux) - ("lvm2" ,lvm2) ; for libdevmapper - ("curl" ,curl) - ("openssl" ,openssl) - ("cyrus-sasl" ,cyrus-sasl) - ("perl" ,perl) - ("python" ,python-2) - ("libyajl" ,libyajl) - ("audit" ,audit) - ("dmidecode" ,dmidecode) - ("dnsmasq" ,dnsmasq) - ("ebtables" ,ebtables) - ("iproute" ,iproute) - ("iptables" ,iptables))) - (native-inputs - `(("pkg-config" ,pkg-config))) - (home-page "http://libvirt.org") - (synopsis "Simple API for virtualization") - (description "Libvirt is a C toolkit to interact with the virtualization -capabilities of recent versions of Linux. The library aims at providing long -term stable C API initially for the Xen paravirtualization but should be able -to integrate other virtualization mechanisms if needed.") - (license lgpl2.1+))) - -(define-public libvirt-glib - (package - (name "libvirt-glib") - (version "1.0.0") - (source (origin - (method url-fetch) - (uri (string-append "ftp://libvirt.org/libvirt/glib/" - "libvirt-glib-" version ".tar.gz")) - (sha256 - (base32 - "0iwa5sdbii52pjpdm5j37f67sdmf0kpcky4liwhy1nf43k85i4fa")))) - (build-system gnu-build-system) - (arguments - `(#:phases - (modify-phases %standard-phases - (add-after 'unpack 'fix-tests - (lambda _ - (substitute* "tests/test-events.c" - (("/bin/true") (which "true"))) - #t))))) - (inputs - `(("libxml2" ,libxml2) - ("libvirt" ,libvirt) - ("gobject-introspection" ,gobject-introspection) - ("glib" ,glib) - ("openssl" ,openssl) - ("cyrus-sasl" ,cyrus-sasl) - ("lvm2" ,lvm2) ; for libdevmapper - ("libyajl" ,libyajl))) - (native-inputs - `(("pkg-config" ,pkg-config) - ("intltool" ,intltool) - ("glib" ,glib "bin") - ("vala" ,vala))) - (home-page "http://libvirt.org") - (synopsis "GLib wrapper around libvirt") - (description "libvirt-glib wraps the libvirt library to provide a -high-level object-oriented API better suited for glib-based applications, via -three libraries: - -@enumerate -@item libvirt-glib - GLib main loop integration & misc helper APIs -@item libvirt-gconfig - GObjects for manipulating libvirt XML documents -@item libvirt-gobject - GObjects for managing libvirt objects -@end enumerate -") - (license lgpl2.1+))) - -(define-public python-libvirt - (package - (name "python-libvirt") - (version "3.4.0") - (source (origin - (method url-fetch) - (uri (pypi-uri "libvirt-python" version)) - (sha256 - (base32 - "04dma3979171p9yf0cg7m03shk038hc9vyfm9lb8z60qyn0pg9xg")))) - (build-system python-build-system) - (arguments - `(#:phases - (modify-phases %standard-phases - (add-after 'unpack 'patch-nosetests-path - (lambda* (#:key inputs #:allow-other-keys) - (substitute* "setup.py" - (("\"/usr/bin/nosetests\"") - (string-append "\"" (which "nosetests") "\"")) - (("self\\.spawn\\(\\[sys\\.executable, nose\\]\\)") - (format #f "self.spawn([\"~a\", nose])" (which "bash")))) - #t))))) - (inputs - `(("libvirt" ,libvirt))) - (propagated-inputs - `(("python-lxml" ,python-lxml))) - (native-inputs - `(("pkg-config" ,pkg-config) - ("python-nose" ,python-nose))) - (home-page "http://libvirt.org") - (synopsis "Python bindings to libvirt") - (description "This package provides Python bindings to the libvirt -virtualization library.") - (license lgpl2.1+))) - -(define-public python2-libvirt - (package-with-python2 python-libvirt)) - -(define-public virt-manager - (package - (name "virt-manager") - (version "1.4.1") - (source (origin - (method url-fetch) - (uri (string-append "https://virt-manager.org/download/sources" - "/virt-manager/virt-manager-" - version ".tar.gz")) - (sha256 - (base32 - "0i1rkxz730vw1nqghrp189jhhp53pw81k0h71hhxmyqlkyclkig6")))) - (build-system python-build-system) - (arguments - `(#:python ,python-2 - #:use-setuptools? #f ; Uses custom distutils 'install' command. - ;; Some of the tests seem to require network access to install virtual - ;; machines. - #:tests? #f - #:modules ((ice-9 match) - (srfi srfi-26) - (guix build python-build-system) - (guix build utils)) - #:phases - (modify-phases %standard-phases - (add-after 'unpack 'fix-setup - (lambda* (#:key outputs #:allow-other-keys) - (substitute* "virtcli/cliconfig.py" - (("/usr") (assoc-ref outputs "out"))) - #t)) - (add-before 'wrap 'wrap-with-GI_TYPELIB_PATH - (lambda* (#:key inputs outputs #:allow-other-keys) - (let* ((bin (string-append (assoc-ref outputs "out") "/bin")) - (bin-files (find-files bin ".*")) - (paths (map (match-lambda - ((output . directory) - (let* ((girepodir (string-append - directory - "/lib/girepository-1.0"))) - (if (file-exists? girepodir) - girepodir #f)))) - inputs))) - (for-each (lambda (file) - (format #t "wrapping ~a\n" file) - (wrap-program file - `("GI_TYPELIB_PATH" ":" prefix - ,(filter identity paths)))) - bin-files)) - #t))))) - (inputs - `(("gtk+" ,gtk+) - ("gtk-vnc" ,gtk-vnc) - ("libvirt" ,libvirt) - ("libvirt-glib" ,libvirt-glib) - ("libosinfo" ,libosinfo) - ("vte" ,vte) - ("gobject-introspection" ,gobject-introspection) - ("python2-libvirt" ,python2-libvirt) - ("python2-requests" ,python2-requests) - ("python2-ipaddr" ,python2-ipaddr) - ("python2-pygobject" ,python2-pygobject) - ("python2-libxml2" ,python2-libxml2))) - ;; virt-manager searches for qemu-img or kvm-img in the PATH. - (propagated-inputs - `(("qemu" ,qemu))) - (native-inputs - `(("glib" ,glib "bin") ; glib-compile-schemas. - ("gtk+" ,gtk+ "bin") ; gtk-update-icon-cache - ("perl" ,perl) ; pod2man - ("intltool" ,intltool))) - (home-page "https://virt-manager.org/") - (synopsis "Manage virtual machines") - (description - "The virt-manager application is a desktop user interface for managing -virtual machines through libvirt. It primarily targets KVM VMs, but also -manages Xen and LXC (Linux containers). It presents a summary view of running -domains, their live performance and resource utilization statistics.") - (license gpl2+))) |